Linux Security Week: February 7, 2022
Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we examine real-time alerting strategies with the snort network intrusion detection system and how to configure them to alert you of possible intrusion events, explore the anatomy of a fileless malware attack on Linux and how to protect against this growing threat, and offer insight into the mission behind our site, our history and the content we provide.
Have a question about or a comment on one of this week's articles? Let's discuss! Read on to get the details on these critical topics.
Yours in Open Source,
Real-Time Alerting with Snort
Learn about real-time alerting strategies with the snort network intrusion detection system and how to configure them to alert you of possible intrusion events.
Pulling Back the Curtain: About LinuxSecurity.com
Welcome to LinuxSecurity.com - the community's central source for information on Linux and open source security since 1996. Whether you’re a new visitor or a long-time community member, this article will provide you with insight into the mission behind our site, our history and the content we provide.
Learn more about pulling back the curtain about linuxsecurity com
Fileless Malware on Linux: Anatomy of an Attack
What exactly is fileless malware and how does a fileless malware attack on Linux work? This article will provide you with answers to these questions by honing in on the anatomy of a Linux fileless malware attack - equipping you with the knowledge necessary to secure your systems and your data against this stealthy, malicious threat.
Learn more about fileless malware on linux